Mythic is a collaborative, multi-platform, red teaming framework that enables users to simulate attacks and test their defenses. It provides a flexible and customizable platform for red teaming, allowing users to create and manage their own attacks, and collaborate with others in real-time. Mythic supports multiple platforms, including Windows, Linux, and macOS, and provides a range of features such as payload generation, command and control, and post-exploitation capabilities. The framework is designed to be highly customizable, allowing users to create their own plugins and modules to extend its functionality. Additionally, Mythic provides a web-based interface for easy management and collaboration. Overall, Mythic is a powerful tool for red teaming and penetration testing, providing a flexible and customizable platform for simulating attacks and testing defenses.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.
A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.
A list of useful payloads and bypasses for Web Application Security.
Emulate operating systems behind SSH servers for testing automation.
Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.
A tool that scans for accessibility tools backdoors via RDP